CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Improved Image Steganography Technique for Colored Images using Wavelet Transform

by Saddaf Rubab, M. Younus
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 14
Year of Publication: 2012
Authors: Saddaf Rubab, M. Younus
10.5120/4890-7381

Saddaf Rubab, M. Younus . Improved Image Steganography Technique for Colored Images using Wavelet Transform. International Journal of Computer Applications. 39, 14 ( February 2012), 29-32. DOI=10.5120/4890-7381

@article{ 10.5120/4890-7381,
author = { Saddaf Rubab, M. Younus },
title = { Improved Image Steganography Technique for Colored Images using Wavelet Transform },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 14 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number14/4890-7381/ },
doi = { 10.5120/4890-7381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:28.833513+05:30
%A Saddaf Rubab
%A M. Younus
%T Improved Image Steganography Technique for Colored Images using Wavelet Transform
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 14
%P 29-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Steganography is the most used technique for data hiding. We can implement it using any cover media like text, images, and videos. In this paper we devised a new algorithm to hide our text in any colored image of any size using wavelet transform. It improves the image quality and imperceptibility. Our method sustains the security attacks. Extensive testing is performed using different sizes of images and presented our results in payload and PSNR values.

References
  1. N. Provos, P. Honeyman, “Hide and seek: An introduction to steganography”, IEEE Security Privacy Magazine (2003), Volume: 1, Issue: 3, Publisher: IEEE Security & Privacy, Pages: 32-44
  2. Johnson, N.F. & Jajodia, S., “Exploring Steganography: Seeing the Unseen”, Computer Journal, February 1998
  3. Almohammad, A.; Ghinea, G.; “Stego image quality and the reliability of PSNR”, 2nd International Conference on Image Processing Theory Tools and Applications (IPTA), 2010, Pages: 215 – 220
  4. Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010, Pages: 358-364
  5. Aamer Nadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005
  6. Wavelet Transform and Denoising: http://scholar.lib.vt.edu/theses/available/etd-12062002-152858/unrestricted/Chapter4.pdf
  7. Amitava Nag, Sushanta Biswas, Debasree Sarkar & Partha Pratim Sarkar, “A Novel Technique for Image Steganography Based on DWT and Huffman Encoding”, International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue (6)
  8. Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique Based on Wavelet Transform”, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010
  9. M. F. Tolba, M. A. Ghonemy, I. A. Taha, and A. S. Khalifa, “Using Integer Wavelet Transforms in Colored Image-Steganography”, IJICIS Vol. 4 No. 2, July 2004
Index Terms

Computer Science
Information Sciences

Keywords

Steganography payload wavelet transforms stego image colored image blowfish